[Serusers] Invite going to my gateway
Nils Ohlmeier
nils at iptel.org
Fri Dec 22 16:30:33 CET 2006
For some reason your SER believes that 192.168.2.136 is its IP address, but
192.168.2.1 is not its IP address. My guess: you configured aliases in your
config wrong.
Second problem: the INVITE seems to contain a Route header with 192.168.136 in
it. Why is this header there? Fix the configuration/setup of your phone to
remove this "wrong" header.
Nils
On Thursday 21 December 2006 00:12, Bill wrote:
> Scenario:
> I have two test phones setup to a SER server. The two phones are
> 192.168.2.133 and 192.168.2.101. My server is 192.168.2.1. I can call from
> .101 to .133 fine. When I try to place a call from .133 this is what I get.
>
> 0(2734) SIP Request:
> 0(2734) method: <INVITE>
> 0(2734) uri: <sip:1001 at 192.168.2.1>
> 0(2734) version: <SIP/2.0>
> 0(2734) parse_headers: flags=1
> 0(2734) Found param type 232, <branch> = <z9hG4bK7e2902f2a>; state=16
> 0(2734) end of header reached, state=5
> 0(2734) parse_headers: Via found, flags=1
> 0(2734) parse_headers: this is the first via
> 0(2734) After parse_msg...
> 0(2734) preparing to run routing scripts...
> 0(2734) parse_headers: flags=128
> 0(2734) DEBUG:maxfwd:is_maxfwd_present: value = 70
> 0(2734) DBG:maxfwd:process_maxfwd_header: value 70 decreased to 16
> 0(2734) parse_headers: flags=8
> 0(2734) DEBUG: get_hdr_body : content_length=586
> 0(2734) end of header reached, state=9
> 0(2734) DEBUG: get_hdr_field: <To> [29]; uri=[sip:1001 at 192.168.2.1]
> 0(2734) DEBUG: to body [1001 <sip:1001 at 192.168.2.1>
> ]
> 0(2734) DEBUG: add_param: tag=4d4e374f5ebe6ab
> 0(2734) end of header reached, state=29
> 0(2734) parse_headers: flags=256
> 0(2734) get_hdr_field: cseq <CSeq>: <1338505295> <INVITE>
> 0(2734) is_preloaded: Yes
> 0(2734) grep_sock_info - checking if host==us: 13==13 && [192.168.2.136]
> == [192.168.2.136]
> 0(2734) grep_sock_info - checking if port 5060 matches port 5060
> 0(2734) after_loose: Topmost route URI: 'sip:192.168.2.136:5060;lr' is me
> 0(2734) parse_headers: flags=256
> 0(2734) found end of header
> 0(2734) find_next_route: No next Route HF found
> 0(2734) after_loose: No next URI found
> 0(2734) grep_sock_info - checking if host==us: 11==13 && [192.168.2.1] ==
> [192.168.2.136]
> 0(2734) grep_sock_info - checking if port 5060 matches port 5060
> 0(2734) grep_sock_info - checking if host==us: 11==13 && [192.168.2.1] ==
> [192.168.2.136]
> 0(2734) grep_sock_info - checking if port 5060 matches port 5060
> 0(2734) check_self: host != me
> 0(2734) DEBUG: t_newtran: msg id=45 , global msg id=43 , T on
> entrance=0xffffffff
> 0(2734) parse_headers: flags=-1
> 0(2734) parse_headers: flags=60
> 0(2734) t_lookup_request: start searching: hash=15747, isACK=0
> 0(2734) DEBUG: RFC3261 transaction matching failed
> 0(2734) DEBUG: t_lookup_request: no transaction found
> 0(2734) SER: new INVITE
> 0(2734) parse_headers: flags=-1
> 0(2734) check_via_address(192.168.2.133, 192.168.2.133, 0)
> 0(2734) WARNING:vqm_resize: resize(0) called
> 0(2734) DEBUG: reply sent out. buf=0x8104e98: SIP/2.0 1...,
> shmem=0xb6145728: SIP/2.0 1
> 0(2734) DEBUG: _reply_light: finished
> 0(2734) DEBUG: mk_proxy: doing DNS lookup...
> 0(2734) check_via_address(192.168.2.133, 192.168.2.133, 0)
> 0(2734) DEBUG: add_to_tail_of_timer[4]: 0xb6143eb8
> 0(2734) DEBUG: add_to_tail_of_timer[0]: 0xb6143ec8
> 0(2734) SER: new transaction fwd'ed
> 0(2734) DEBUG:destroy_avp_list: destroying list (nil)
> 0(2734) receive_msg: cleaning up
> 1(2737) DEBUG: timer routine:4,tl=0xb6143eb8 next=(nil)
> 1(2737) DEBUG: retransmission_handler : request resending (t=0xb6143da0,
> INVITE si ... )
> 1(2737) DEBUG: add_to_tail_of_timer[5]: 0xb6143eb8
> 1(2737) DEBUG: retransmission_handler : done
> 0(2734) SIP Request:
> 0(2734) method: <CANCEL>
> 0(2734) uri: <sip:1001 at 192.168.2.1>
> 0(2734) version: <SIP/2.0>
> 0(2734) parse_headers: flags=1
> 0(2734) Found param type 232, <branch> = <z9hG4bK7e2902f2a>; state=16
> 0(2734) end of header reached, state=5
> 0(2734) parse_headers: Via found, flags=1
> 0(2734) parse_headers: this is the first via
> 0(2734) After parse_msg...
> 0(2734) preparing to run routing scripts...
> 0(2734) parse_headers: flags=128
> 0(2734) DEBUG:maxfwd:is_maxfwd_present: value = 70
> 0(2734) DBG:maxfwd:process_maxfwd_header: value 70 decreased to 16
> 0(2734) parse_headers: flags=8
> 0(2734) DEBUG: get_hdr_body : content_length=0
> 0(2734) end of header reached, state=9
> 0(2734) DEBUG: get_hdr_field: <To> [29]; uri=[sip:1001 at 192.168.2.1]
> 0(2734) DEBUG: to body [1001 <sip:1001 at 192.168.2.1>
> ]
> 0(2734) DEBUG: add_param: tag=4d4e374f5ebe6ab
> 0(2734) end of header reached, state=29
> 0(2734) parse_headers: flags=256
> 0(2734) get_hdr_field: cseq <CSeq>: <1338505295> <CANCEL>
> 0(2734) is_preloaded: Yes
> 0(2734) grep_sock_info - checking if host==us: 13==13 && [192.168.2.136]
> == [192.168.2.136]
> 0(2734) grep_sock_info - checking if port 5060 matches port 5060
> 0(2734) after_loose: Topmost route URI: 'sip:192.168.2.136:5060;lr' is me
> 0(2734) parse_headers: flags=256
> 0(2734) found end of header
> 0(2734) find_next_route: No next Route HF found
> 0(2734) after_loose: No next URI found
> 0(2734) grep_sock_info - checking if host==us: 11==13 && [192.168.2.1] ==
> [192.168.2.136]
> 0(2734) grep_sock_info - checking if port 5060 matches port 5060
> 0(2734) grep_sock_info - checking if host==us: 11==13 && [192.168.2.1] ==
> [192.168.2.136]
> 0(2734) grep_sock_info - checking if port 5060 matches port 5060
> 0(2734) check_self: host != me
> 0(2734) DEBUG: t_newtran: msg id=46 , global msg id=45 , T on
> entrance=0xffffffff
>
> Bill Hissong
>
> _______________________________________________
> Serusers mailing list
> Serusers at lists.iptel.org
> http://lists.iptel.org/mailman/listinfo/serusers
--
Dipl. Inform. Nils Ohlmeier
Quality Assurance Manager
iptelorg GmbH
Am Borsigturm 11
13507 Berlin
Germany
nils.ohlmeier at iptelorg.com
www.iptelorg.com
T +49-30-325132 22
T +49-700-IPTELORG
F +49-30-6908 8248
More information about the sr-users
mailing list